Conference Papers


Home
Publications
Most Cited Papers
Guide to Papers
Patents
Grants
PhD's Awarded
Invited Talks etc.
Teaching
Vitae etc.
Contact Me

Up Conference Papers Journal Papers Articles Miscellaneous Acronyms

    2022: 7

  1. Mehrnoosh Shakarami, James Benson and Ravi Sandhu, Scenario-Driven Device-to-Device Access Control in Smart Home IoT. In 4th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), Atlanta, GA, December 14-17 2022, pages 217-228. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  2. Lopamudra Praharaj, Safwa Ameer, Maanak Gupta and Ravi Sandhu, Attributes Aware Relationship-Based Access Control for Smart IoT Systems (Winner of Best Paper Award). In Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing (CIC), Dec. 2022, pages 72-81. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  3. Mohammad Nur Nobi, Ram Krishnan, Yufei Huang and Ravi Sandhu, Administration of Machine Learning Based Access Control. In Proceeding of the 27th European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, September 26-30, 2022, pages 189-210 Presentation(pptx) (pdf)
    Google Scholar Search 1+
  4. Safwa Ameer, Maanak Gupta, Smriti Bhatt and Ravi Sandhu, Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems. In Proceedings of the 27th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 8-10, 2022, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  5. Tanjila Mawla, Maanak Gupta and Ravi Sandhu, Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems. In Proceedings of the 27th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 8-10, 2022, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  6. Mehrnoosh Shakarami, James Benson and Ravi Sandhu, Blockchain-Based Administration of Access in Smart Home IoT. In Proceedings of the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SAT-CPS), April 27, 2022, Baltimore, MD, pages 57-66. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  7. Mohammad Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami and Ravi Sandhu, Toward Deep Learning Based Access Control. In Proceedings of the 12th ACM Conference on Data and Application Security and Privacy (CODASPY), April 25-27, 2022, Hanover, MD, pages 10. Presentation(pptx) (pdf)
    Google Scholar Search 10+
  8. 2021: 9

  9. Glen Cathey, James Benson, Maanak Gupta and Ravi Sandhu, Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems. In Proceedings Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Virtual Event, Dec. 13-15, 2021, pages 70-79. Presentation(pptx) (pdf)
    Google Scholar Search
  10. John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu and Ravi Sandhu, Access Control Policy Generation from User Stories Using Machine Learning. In Proc. 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Virtual Event, July 19-20, 2021, 18 pages. Presentation(pdf)
    Google Scholar Search
  11. Shuvra Chakraborty and Ravi Sandhu, On Feasibility of Attribute-Aware Relationship-Based Access Control Policy Mining. In Proc. 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Virtual Event, July 19-20, 2021, 12 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  12. Na Shi, Bo Tang, Ravi Sandhu and Qi Li, DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things. In Proc. 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Virtual Event, July 19-20, 2021, 12 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  13. Maanak Gupta and Ravi Sandhu, Towards Activity-Centric Access Control for Smart Collaborative Ecosystems. In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 16-18, 2021, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  14. Jingwen Fan, Yi Hey, Bo Tang, Qi Li and Ravi Sandhu, Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), May 10-13, 2021, Virtual Event, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  15. Shuvra Chakraborty and Ravi Sandhu, Formal Analysis of ReBAC Policy Mining Feasibility. In Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (CODASPY), April 26-28, 2021, Virtual Event, 11 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  16. Safwa Ameer and Ravi Sandhu, The HABAC Model for Smart Home IoT and Comparison to EGRBAC. In Proceedings of the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SAT-CPS), April 28, 2021, Virtual Event, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  17. Mehrnoosh Shakarami and Ravi Sandhu, Role-Based Administration of Role-Based Smart Home IoT. In Proceedings of the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SAT-CPS), April 28, 2021, Virtual Event, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  18. 2020: 7

  19. Smriti Bhatt and Ravi Sandhu, Convergent Access Control to Enable Secure Smart Communities. In Proceedings of 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), Virtual Event, December 1-3, 2020, 9 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  20. Abdullah Al-Alaj, Ravi Sandhu and Ram Krishnan, A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions. In Proceedings of 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), Virtual Event, December 1-3, 2020, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  21. Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu, ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions. In Proceedings of 6th IEEE International Conference on Collaboration and Internet Computing (CIC), Virtual Event, December 1-3, 2020, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  22. Sina Sontowski, Maanak Gupta, Sai Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi and Ravi Sandhu, Cyber Attacks on Smart Farming Infrastructure. In Proceedings of 6th IEEE International Conference on Collaboration and Internet Computing (CIC), Virtual Event, December 1-3, 2020, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  23. Naiwei Liu, Meng Yu, Wanyu Zang and Ravi Sandhu, On the Cost-Effectiveness of TrustZone Defense on ARM Platform. In Proceedings of 21st World Conference on Information Security Applications (WISA), Virtual Event, August 26-28, 2020, 12 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  24. Safwa Ameer, James Benson and Ravi Sandhu, The EGRBAC Model for Smart Home IoT. In Proceedings of the 21st IEEE Conference on Information Reuse and Integration (IRI), Virtual Event, August 11-13, 2020, 8 pages. Presentation(pptx) (pdf) (mp4)
    Google Scholar Search
  25. Smriti Bhatt and Ravi Sandhu, ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things. In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 10-12, 2020, pages 203-212. Presentation(pptx) (pdf)
    Google Scholar Search
  26. 2019: 10

  27. Mehrnoosh Shakarami and Ravi Sandhu, Safety and Consistency of Mutable Attributes Using Quotas: A Formal Analysis. In Proceedings of the 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Los Angeles, California, December 12-14, 2019, 9 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  28. Shuvra Chakraborty, Ravi Sandhu and Ram Krishnan, On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis. In Proceedings of the 8th International Conference on Secure Knowledge Management in Artificial Intelligence Era (SKM), Goa, India, December 21-22, 2019, 17 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  29. Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu, SDN-RBAC: An Access Control Model for SDN Controller Applications. In Proceedings of the 4th International Conference on Computing, Communications and Security (ICCCS), Rome, Italy, October 10-12, 2019, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  30. Shuvra Chakraborty, Ravi Sandhu and Ram Krishnan, On the Feasibility of Attribute-Based Access Control Policy Mining. In Proceedings of the 20th IEEE Conference on Information Reuse and Integration (IRI), Los Angeles, California, July 30-August 1, 2019, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  31. Mehrnoosh Shakarami and Ravi Sandhu, Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis. In Proceedings 31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Charleston, SC, July 15-17, 2019. Presentation(pptx) (pdf)
    Google Scholar Search
  32. Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu, Online Malware Detection in Cloud Auto-Scaling Systems Using Shallow Convolutional Neural Networks. In Proceedings 31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Charleston, SC, July 15-17, 2019. Presentation(pptx) (pdf)
    Google Scholar Search
  33. Mehrnoosh Shakarami and Ravi Sandhu, Safety and Consistency of Subject Attributes for Attribute-Based Pre-Authorization Systems. In Proceedings National Cyber Summit (NCS), Huntsville, Alabama, June 4-6, 2019. Presentation(pptx) (pdf)
    Google Scholar Search
  34. Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li and Ravi Sandhu, IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT), Toronto, Canada, June 4-6, 2019. Presentation(pptx) (pdf)
    Google Scholar Search
  35. Maanak Gupta, James Benson, Farhan Patwa and Ravi Sandhu, Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars. In Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY), March 25-27, 2019, Richardson, TX, pages 61-72. Presentation(pptx) (pdf)
    Google Scholar Search
  36. Abdullah Al-Alaj, Ravi Sandhu and Ram Krishnan, A Formal Access Control Model for SE-Floodlight Controller. In Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFVSecurity), March 25-27, 2019, Richardson, TX, 6 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  37. 2018: 4

  38. Mahmoud Abdelsalam, Ram Krishnan, Yufei Huang and Ravi Sandhu, Malware Detection in Cloud Infrastructures using Convolutional Neural Networks. In Proceedings 11th IEEE International Conference on Cloud Computing (CLOUD), San Francisco, CA, July 2-7, 2018, 8 pages. Presentation(pdf)
    Google Scholar Search 25+
  39. Maanak Gupta and Ravi Sandhu, Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things. In Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, Indiana, June 13-15, 2018, 12 pages. Presentation(pptx) (pdf)
    Google Scholar Search 25+
  40. Asma Alshehri, James Benson, Farhan Patwa and Ravi Sandhu, Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things. In Proceedings of the 8th ACM Conference on Data and Application Security and Privacy (CODASPY), March 19-21, 2018, Tempe, Arizona. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  41. Maanak Gupta, Farhan Patwa and Ravi Sandhu, An Attribute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem. In Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control (ABAC), March 19-21, 2018, Tempe, Arizona. Presentation(pptx) (pdf)
    Google Scholar Search 30+
  42. 2017: 10

  43. Smriti Bhatt, Farhan Patwa and Ravi Sandhu, An Access Control Framework for Cloud-Enabled Wearable Internet of Things. In Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing (CIC), San Jose, CA, October 15-17, 2017, 11 pages. Presentation(pptx) (pdf)
    Google Scholar Search 30+
  44. Tahmina Ahmed and Ravi Sandhu, Safety of ABACα is Decidable. In Proceedings of the 11th International Conference on Network and System Security (NSS), Helsinki, Finland, August 21-23, 2017, 15 pages. Presentation(pptx) (pdf)
    Google Scholar Search 5+
  45. Smriti Bhatt, Farhan Patwa and Ravi Sandhu, Access Control Model for AWS Internet of Things. In Proceedings of the 11th International Conference on Network and System Security (NSS), Helsinki, Finland, August 21-23, 2017, 15 pages. Presentation(pptx) (pdf)
    Google Scholar Search 30+
  46. Asma Alshehri and Ravi Sandhu, Access Control Models for Virtual Object Communication in Cloud-Enabled IoT In Proceedings of the 18th IEEE Conference on Information Reuse and Integration (IRI), San Diego, California, August 4-7, 2017, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search 30+
  47. Maanak Gupta, Farhan Patwa and Ravi Sandhu, Object-Tagged RBAC Model for the Hadoop Ecosystem. In Proceedings 31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2017), Philadelphia, Pennsylvania, July 19-21, 2017, 18 pages. Presentation(pptx) (pdf)
    Google Scholar Search 20+
  48. Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu, Clustering-Based IaaS Cloud Monitoring. In Proceedings 10th IEEE International Conference on Cloud Computing (CLOUD), Honolulu, Hawaii, June 25-30, 2017, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search 10+
  49. Maanak Gupta, Farhan Patwa, James Benson and Ravi Sandhu, Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment. In Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, Indiana, June 21-23, 2017, pages 183-190. Presentation(pptx) (pdf)
    Google Scholar Search 20+
  50. Tahmina Ahmed, Ravi Sandhu and Jaehong Park, Classifying and Comparing Attribute-Based and Relationship-Based Access Control. In Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY), March 22-24, 2017, Scottsdale, Arizona. Presentation(pptx) (pdf)
    Google Scholar Search 10+
  51. Smriti Bhatt, Farhan Patwa and Ravi Sandhu, ABAC with Group Attributes and Attribute Hierarchies Utilizing the Policy Machine. In Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control (ABAC), March 24, 2017, Scottsdale, Arizona, 12 pages. Presentation(pptx) (pdf)
    Google Scholar Search 25+
  52. Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, Attribute Transformation for Attribute-Based Access Control. In Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control (ABAC), March 24, 2017, Scottsdale, Arizona, 8 pages. Presentation(ppt) (pdf)
    Google Scholar Search 10+
  53. 2016: 12

  54. Smriti Bhatt, Farhan Patwa and Ravi Sandhu, An Attribute-Based Access Control Extension for OpenStack and its Enforcement Utilizing the Policy Machine. In Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing (CIC), Pittsburgh, PA, November 1-3, 2016, 9 pages. Presentation(pptx) (pdf)
    Google Scholar Search 20+
  55. Asma Alshehri and Ravi Sandhu, Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda. In Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing (CIC), Pittsburgh, PA, November 1-3, 2016, 9 pages. Presentation(pptx) (pdf)
    Google Scholar Search 40+
  56. Maanak Gupta and Ravi Sandhu, The GURAG Administrative Model for User and Group Attribute Assignment. In Proceedings of the 10th International Conference on Network and System Security (NSS), Taipei, Taiwan, September 28-30, 2016, 15 pages. Presentation(pptx) (pdf)
    Google Scholar Search 30+
  57. Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, An Attribute-Based Protection Model for JSON Documents. In Proceedings of the 10th International Conference on Network and System Security (NSS), Taipei, Taiwan, September 28-30, 2016, 16 pages. Presentation(ppt) (pdf)
    Google Scholar Search 1+
  58. Asma Alshehri and Ravi Sandhu, On the Relationship between Finite Domain ABAM and PreUCONA. In Proceedings of the 10th International Conference on Network and System Security (NSS), Taipei, Taiwan, September 28-30, 2016, 14 pages. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  59. Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control. In Proceedings 19th Information Security Conference, (ISC 2016), Honolulu, Hawaii, September 7-9, 2016, 14 pages. Presentation(ppt) (pdf)
    Google Scholar Search 1+
  60. Tahmina Ahmed, Farhan Patwa and Ravi Sandhu, Object-to-Object Relationship-Based Access Control: Model and Multi-Cloud Demonstration. In Proceedings of the 17th IEEE Conference on Information Reuse and Integration (IRI), Pittsburgh, Pennsylvania, July 28-30, 2016, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  61. Navid Pustchi and Ravi Sandhu, Role-Centric Circle of Trust in Multi-Tenant Cloud IaaS. In Proceedings 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016, 16 pages. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  62. Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, A Comparison of Logical Formula and Enumerated Authorization Policy ABAC Models (with addendum). In Proceedings 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  63. Yuan Cheng, Khalid Bijon and Ravi Sandhu, Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support. In Proc. 21st ACM Symposium on Access Control Models and Technologies (SACMAT), Shanghai, China, June 6-8, 2016, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search 10+
  64. Yun Zhang, Farhan Patwa and Ravi Sandhu, Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS. In Proceedings of the 4th ACM Workshop on Security in Cloud Computing (SCC), May 30, 2016, Xi'an, China, 8 pages. Presentation(pdf)
    Google Scholar Search 1+
  65. Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy. In Proceedings of the 1st ACM Workshop on Attribute-Based Access Control (ABAC), March 11, 2016, New Orleans, Louisiana, 12 pages. Presentation(pptx) (pdf)
    Google Scholar Search 30+
  66. 2015: 6

  67. Navid Pustchi and Ravi Sandhu, MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust. In Proceedings of the 9th International Conference on Network and System Security (NSS), New York, New York, November 3-5, 2015, 14 pages. Presentation(pptx) (pdf)
    Google Scholar Search 10+
  68. Yun Zhang, Farhan Patwa and Ravi Sandhu, Community-Based Secure Information and Resource Sharing in AWS Public Cloud. In Proceedings of the 1st IEEE International Conference on Collaboration and Internet Computing (CIC), Hangzhou, China, October 27-30, 2015, 8 pages. Presentation(pdf)
    Google Scholar Search 10+
  69. Yun Zhang, Farhan Patwa, Ravi Sandhu and Bo Tang, Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud. In Proceedings 16th IEEE Conference on Information Reuse and Integration (IRI), San Francisco, California, August 13-15, 2015, 8 pages. Presentation(pdf)
    Google Scholar Search 10+
  70. Khalid Bijon, Ram Krishnan and Ravi Sandhu, Mitigating Multi-Tenancy Risks in IaaS Cloud through Constraints-Driven Virtual Resource Scheduling. In Proc. 20th ACM Symposium on Access Control Models and Technologies (SACMAT), Vienna, Austria, June 1-3, 2015, pages 63-74. Presentation(pptx) (pdf)
    Google Scholar Search 10+
  71. Navid Pustchi, Ram Krishnan and Ravi Sandhu, Authorization Federation in IaaS Multi Cloud. In Proceedings of the 3rd ACM Workshop on Security in Cloud Computing (SCC), April 14, 2015, Singapore, 9 pages. Presentation(pptx) (pdf)
    Google Scholar Search 20+
  72. Khalid Bijon, Ram Krishnan and Ravi Sandhu, Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY), March 2-4, 2015, San Antonio, Texas, pages 183-194. Presentation(ppt) (pdf)
    Google Scholar Search 10+
  73. 2014: 7

  74. Yun Zhang, Ram Krishnan and Ravi Sandhu, Secure Information and Resource Sharing in Cloud Infrastructure as a Service. In Proceedings of ACM Workshop on Information Sharing and Collaborative Security (WISCS 2014), November 3, 2014, Scottsdale, AZ. Presentation(pptx) (pdf)
    Google Scholar Search 10+
  75. Xin Jin, Ram Krishnan and Ravi Sandhu, Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS. In Proceedings 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Miami, Florida, October 22-25, 2014, 14 pages. Presentation(pptx) (pdf)
    Google Scholar Search 20+
  76. Dang Nguyen, Jaehong Park and Ravi Sandhu, Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. In Proceedings 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, October 15-17, 2014, 15 pages. Presentation (pptx) (pdf)
    Google Scholar Search 10+
  77. Bo Tang and Ravi Sandhu, Extending OpenStack Access Control with Domain Trust. In Proceedings 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, October 15-17, 2014, 15 pages. Presentation (pptx) (pdf)
    Google Scholar Search 40+
  78. Khalid Bijon, Ram Krishnan and Ravi Sandhu, A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service. In Proceedings 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, October 15-17, 2014, 12 pages. Presentation (pptx) (pdf)
    Google Scholar Search 10+
  79. Yuan Cheng, Jaehong Park and Ravi Sandhu, Attribute-aware Relationship-based Access Control for Online Social Networks. In Proceedings 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria, July 14-16, 2014, 16 pages. Presentation (pptx) (pdf)
    Google Scholar Search 25+
  80. Lianshan Sun, Jaehong Park and Ravi Sandhu, Towards Provenance-Based Access Control with Feasible Overhead. In Proceedings 4th International Conference on Information Science, Electronics and Electrical Engineering (ISEEE), Sapporo, Japan, April 26-28, 2014, 5 pages.
    Google Scholar Search 1+
  81. 2013: 9

  82. Xin Jin, Ram Krishnan and Ravi Sandhu, Reachability Analysis for Role-based Administration of Attributes. In Proceedings ACM-CCS Workshop on Digital Identity Management (DIM), Berlin, Germany, November 8, 2013, 12 pages. Presentation(pdf)
    Google Scholar Search 10+
  83. Khalid Bijon, Ram Krishnan and Ravi Sandhu, A Framework for Risk-Aware Role Based Access Control. In Proceedings 6th IEEE-CNS Symposium on Security Analytics and Automation (SAFECONFIG), Washington, DC, October 16, 2013, 8 pages. Presentation(ppt) (pdf)
    Google Scholar Search 40+
  84. Khalid Bijon, Ram Krishnan and Ravi Sandhu, Towards An Attribute Based Constraints Specification Language. In Proceedings 5th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), Washington, DC, September 8-14, 2013, 6 pages. Presentation(ppt) (pdf)
    Google Scholar Search 20+
  85. Bo Tang and Ravi Sandhu, Cross-Tenant Trust Models in Cloud Computing. In Proceedings 14th IEEE Conference on Information Reuse and Integration (IRI), San Francisco, California, August 14-16, 2013, pages 129-136. Presentation(pptx) (pdf)
    Google Scholar Search 20+
  86. Dang Nguyen, Jaehong Park and Ravi Sandhu, A Provenance-based Access Control Model for Dynamic Separation of Duties (Winner of Best Student Paper Award). In Proceedings 11th IEEE Conference on Privacy, Security and Trust (PST), Tarragona, Spain, July 10-12, 2013, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search 25+
  87. Bo Tang, Qi Li and Ravi Sandhu, A Multi-Tenant RBAC Model for Collaborative Cloud Services. In Proceedings 11th IEEE Conference on Privacy, Security and Trust (PST), Tarragona, Spain, July 10-12, 2013, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search 50+
    Notable non-academic citations: Amazon patent 2015.
  88. Bo Tang, Ravi Sandhu and Qi Li, Multi-Tenancy Authorization Models for Collaborative Cloud Services. In Proceedings 14th IEEE Conference on Collaboration Technologies and Systems (CTS), San Diego, California, May 20-24, 2013, 7 pages. Presentation(pptx) (pdf)
    Google Scholar Search 50+ ???
  89. Yuan Cheng, Jaehong Park and Ravi Sandhu, Preserving User Privacy from Third-party Applications in Online Social Networks. In Proceedings 2nd W3C Workshop on Privacy and Security in Online Social Media (PSOSM), Rio de Janeiro, Brazil, May 14, 2013, 6 pages. Presentation(pptx) (pdf)
    Google Scholar Search 30+
  90. Lianshan Sun, Jaehong Park, and Ravi Sandhu, Engineering Access Control Policies for Provenance-Aware Systems. In Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY), February 18-20, 2013, San Antonio, Texas, pages 285-292. Presentation(pdf)
    Google Scholar Search 10+
  91. 2012: 14

  92. Khalid Bijon, Ram Krishnan and Ravi Sandhu, Risk-Aware RBAC Sessions. In Proceedings 8th International Conference on Information Systems Security (ICISS 2012), December 15-19, 2012, IIT, Guwahati, India, pages 59-74. Presentation(pptx) (pdf)
    Google Scholar Search 30+
  93. Jose Morales, Shouhuai Xu and Ravi Sandhu, Analyzing Malware Detection Efficiency with Multiple Anti-Malware Programs. In Proceedings of the 1st ASE International Conference on Cyber Security (ASE 2012), December 14-16, 2012, Washington, DC, pages 56-66. Presentation(pptx) (pdf)
    Google Scholar Search 10+
  94. Xin Jin, Ravi Sandhu and Ram Krishnan, RABAC: Role-Centric Attribute-Based Access Control. In Proceedings 6th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-20, 2012, pages 84-96. Published as Springer Lecture Notes in Computer Science Vol. 7531, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2012. Presentation(pptx) (pdf)
    Google Scholar Search 100+
  95. Khalid Bijon, Tahmina Ahmed, Ravi Sandhu and Ram Krishnan, A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders. In Proceedings 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Pittsburgh, Pennsylvania, October 14-17, 2012, pages 200-209. Cited Technical Report Presentation(ppt) (pdf)
    Google Scholar Search 1+
  96. Xin Jin, Ram Krishnan and Ravi Sandhu, A Role-Based Administration Model for Attributes. In Proceedings of the First ACM International Workshop on Secure and Resilient Architectures and Systems (SRAS '12), Minneapolis, Minnesota, September 19, 2012, pages 7-12. Presentation(pptx) (pdf)
    Google Scholar Search 25+
  97. Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram Krishnan, Jaehong Park and Ravi Sandhu, Towards Provenance and Risk-Awareness in Social Computing. In Proceedings of the First ACM International Workshop on Secure and Resilient Architectures and Systems (SRAS '12), Minneapolis, Minnesota, September 19, 2012, pages 25-30. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  98. Yuan Cheng, Jaehong Park and Ravi Sandhu, Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships (Winner of Best Paper Award). In Proceedings 4th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), Amsterdam, Netherlands, September 3-5, 2012, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search 75+
  99. Dang Nguyen, Jaehong Park and Ravi Sandhu, Integrated Provenance Data for Access Control in Group-Centric Collaboration. In Proceedings 13th IEEE Conference on Information Reuse and Integration (IRI), Las Vegas, Nevada, August 8-10, 2012, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  100. Jaehong Park, Dang Nguyen and Ravi Sandhu, A Provenance-Based Access Control Model. In Proceedings 10th IEEE Conference on Privacy, Security and Trust (PST), Paris, France, July 16-18, 2012, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search 90+
  101. Xin Jin, Ram Krishnan and Ravi Sandhu, A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC In Proceedings 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 11-13, 2012, pages 41-55. Presentation(pptx) (pdf)
    Google Scholar Search 500+
  102. Yuan Cheng, Jaehong Park and Ravi Sandhu, A User-to-User Relationship-based Access Control Model for Online Social Networks In Proceedings 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 11-13, 2012, pages 8-24. Presentation(pptx) (pdf)
    Google Scholar Search 90+
  103. Ravi Sandhu, The Authorization Leap from Rights to Attributes: Maturation or Chaos? In Proceedings 17th ACM Symposium on Access Control Models and Technologies (SACMAT), Newark, NJ, June 20-22, 2012, 2 pages. Presentation(pptx) (pdf)
    Google Scholar Search 40+
  104. Dang Nguyen, Jaehong Park and Ravi Sandhu, Dependency Path Patterns as the Foundation of Access Control in Provenance-Aware Systems. In Proceedings 4th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2012), Boston, MA, June 14-15, 2012, 4 pages. Presentation(pptx) (pdf)
    Google Scholar Search 30+
  105. Khalid Bijon, Ravi Sandhu and Ram Krishnan, A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems. In Proceedings IEEE International Symposium on Security in Collaboration Technologies and Systems (SECOTS 2012), Denver, CO, May 24th, 2012, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  106. 2011: 7

  107. Ram Krishnan and Ravi Sandhu, Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing. In Proceedings 7th International Conference on Information Systems Security (ICISS 2011), December 15-19, 2011, Jadavpur University, Kolkata, 14 pages. Full version Presentation(pptx) (pdf)
    Google Scholar Search 1+
  108. Jose Morales, Michael Main, Weiliang Luo, Shouhuai Xu and Ravi Sandhu, Building Malware Infection Trees. In Proceedings 6th International Conference on Malicious and Unwanted Software (MALWARE), October 18-19, 2011, Fajardo, Puerto Rico. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  109. Jaehong Park, Dang Nguyen and Ravi Sandhu, On Data Provenance in Group-centric Secure Collaboration. In Proceedings 7th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, Florida, October 15-18, 2011, 10 pages. Presentation(pptx) (pdf) (pdf as published in conference)
    Google Scholar Search 10+
  110. Ravi Sandhu, Khalid Zaman Bijon, Xin Jin and Ram Krishnan, RT-Based Administrative Models for Community Cyber Security Information Sharing. In Proceedings of the 6th IEEE International Workshop on Trusted Collaboration (TrustCol 2011), Orlando, Florida, October 15, 2011, 6 pages. Presentation(pptx) (pdf)
    Google Scholar Search 10+
  111. Savith Kandala, Ravi Sandhu and Venkata Bhamidipati, An Attribute Based Framework for Risk-Adaptive Access Control Models. In Proceedings 6th International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 22-26, 2011, 6 pages. Presentation (ppt) (pdf)
    Google Scholar Search 80+
  112. Jaehong Park, Ravi Sandhu and Yuan Cheng, ACON: Activity-Centric Access Control for Social Computing. In Proceedings 6th International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 22-26, 2011, 6 pages. Presentation (pptx) (pdf)
    Google Scholar Search 25+
  113. Ravi Sandhu, The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? In Proceedings 1st ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, Texas, February 21-23, 2011, 2 pages. (Inaugural Keynote Talk.) Presentation(ppt) (pdf)
    Google Scholar Search 1+
  114. 2010: 9

  115. Jose Morales, Ravi Sandhu and Shouhuai Xu, Evaluating Detection and Treatment Effectiveness of Commercial Anti-malware Programs. In Proceedings 5th International Conference on Malicious and Unwanted Software (MALWARE), October 19-20 2010, Nancy, France, pages 31-38. Presentation(pptx) (pdf)
    Google Scholar Search
  116. Ravi Sandhu, Ram Krishnan and Gregory White, Towards Secure Information Sharing Models for Community Cyber Security. In Proceedings 6th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Chicago, Illinois, October 9-12, 2010, 6 pages. Presentation(ppt) (pdf)
    Google Scholar Search
  117. Jaehong Park, Yuan Cheng and Ravi Sandhu, Towards a Framework for Cyber Social Status Based Trusted Open Collaboration. In Proceedings of the 5th IEEE International Workshop on Trusted Collaboration (TrustCol 2010), Chicago, Illinois, October 9, 2010, 8 pages. Presentation(ppt) (pdf)
    Google Scholar Search
  118. Ravi Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff and Josh Zachary, Towards a Discipline of Mission-Aware Cloud Computing. In Proceedings of the 2nd ACM Cloud Computing Security Workshop (CCSW 10), Chicago, Illinois, October 08, 2010, pages 13-17. Presentation(ppt) (pdf)
    Google Scholar Search ...
  119. Ravi Sandhu, Ram Krishnan, Jianwei Niu and William Winsborough, Group-Centric Models for Secure and Agile Information Sharing. In Proceedings 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, pages 55-69. Published as Springer Lecture Notes in Computer Science Vol. 6258, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2010. Presentation(ppt) (pdf)
    Google Scholar Search
  120. Jose Morales, Erhan Kartaltepe, Shouhuai Xu and Ravi Sandhu, Symptoms-Based Detection of Bot Processes. In Proceedings 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, pages 229-241. Published as Springer Lecture Notes in Computer Science Vol. 6258, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2010. Presentation(ppt) (pdf)
    Google Scholar Search
  121. Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu and Ravi Sandhu, Analyzing and Exploiting Network Behaviors of Malware. In Proceedings 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), September 7-9, 2010, Singapore, pages 20-34. Published as Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Vol. 50, Security and Privacy in Communication Networks (S. Jajodia and J. Zhou, editors), 2010. Presentation(ppt) (pdf)
    Google Scholar Search ...
  122. Shouhuai Xu, Haifeng Qian, FengyingWang, Zhenxin Zhan, Elisa Bertino and Ravi Sandhu, Trustworthy Information: Concepts and Mechanisms. In Proceedings 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhaigou, China, July 15-17, 2010, pages 398-404. Published as Springer Lecture Notes in Computer Science Vol. 6184, Web-Age Information Management (Chen, L., Tang, C., Yang, J. and Gao, Y., editors), 2010. Presentation(pdf)
    Google Scholar Search
  123. Erhan Kartaltepe, Jose Andre Morales, Shouhuai Xu and Ravi Sandhu, Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. In Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, June 22-25, 2010, pages 511-528. Published as Springer Lecture Notes in Computer Science Vol. 6123, Applied Cryptography and Network Security (Jianying Zhou and Moti Yung, editors), 2010. Presentation(ppt) (pdf)
    Google Scholar Search *
  124. 2009: 12

  125. Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, Towards a Framework for Group-Centric Secure Collaboration. In Proceedings 5th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Crystal City, Virginia, November 11-14, 2009, pages 1-10. Presentation(ppt w/animation) (pdf)
    Google Scholar Search 0.1*
  126. Jose Morales, Areej Al-Bataineh, Shouhuai Xu and Ravi Sandhu, Analyzing DNS Activities of Bot Processes. In Proceedings 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), Montreal, Quebec, Canada, October 13-14, 2009, pages 98-103. Presentation(ppt) (pdf)
    Google Scholar Search 0.1*
  127. Ram Krishnan and Ravi Sandhu, A Hybrid Enforcement Model for Group-Centric Secure Information Sharing. In Proceedings IEEE International Conference on Computational Science and Engineering (CSE-09), Vancouver, Canada, August 29-31, 2009, pages 189-194. Full version Presentation(ppt) (pdf)
    Google Scholar Search 0*
  128. Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi Sandhu and Weilei Han, An Access Control Language for a General Provenance Model. In Proceedings 6th VLDB Workshop on Secure Data Management (SDM'09), August 28, 2009, Lyon, France, pages 68-88. Published as Springer Lecture Notes in Computer Science Vol. 5776, SDM 2009 (W. Jonker and M. Petkovi4c, editors), 2009. Presentation(ppt) Presentation(pdf)
    Google Scholar Search 0.5*
  129. Shouhuai Xu, Ravi Sandhu, and Elisa Bertino, TIUPAM: A Framework for Trustworthiness-Centric Information Sharing. In Proceedings 3rd IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Purdue University, West Lafayette, June 15-19, 2009, pages 164-175. Published as Springer IFIP Advances in Information and Communication Technology Vol. 300, Trust Management III (E. Ferrari, N. Li, E. Bertino and Y. Karabulut, editors), 2009. Presentation (ppt) Presentation (pdf)
    Google Scholar Search 0.1*
  130. Shouhuai Xu, Qun Ni, Elisa Bertino and Ravi Sandhu, A Characterization of the Problem of Secure Provenance Management. In Proceedings IEEE International Conference on Intelligence and Security Informatics (ISI-2009): Workshop on Assured Information Sharing (WAIS), June 8-11, 2009, Dallas, Texas, pages 310-314. Presentation (ppt) Presentation (pdf)
    Google Scholar Search 0.1*
  131. Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, Foundations for Group-Centric Secure Information Sharing Models. In Proceedings 14th ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, June 3-5, 2009, pages 115-124. Presentation(ppt) Presentation(pdf) Techreport(citation [19])
    Google Scholar Search 0.1* +++
  132. Ravi Sandhu, The PEI Framework for Application-Centric Security. In Proceedings 1st IEEE International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009. Invited Lecture Presentation
    Google Scholar Search 0.1*
    Also published as: Ravi Sandhu, The PEI Framework for Application-Centric Security. In Proceedings 5th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Crystal City, Virginia, November 11-14, 2009, pages 1-5. Presentation(ppt) (pdf)
    Google Scholar Search -*
  133. Ram Krishnan and Ravi Sandhu, Enforcement Architecture and Implementation Model for Group-Centric Information Sharing. In Proceedings 1st IEEE International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009. Presentation
    Google Scholar Search 0*
  134. Justin Leonard, Shouhuai Xu, and Ravi Sandhu, A First Step Towards Characterizing Stealthy Botnets. In Proceedings of 4th International Conference on Availability, Reliability and Security (ARES), Fukuoka Institute of Technology, Fukuoka, Japan, March 16-19, 2009, pages 106-113. Presentation
    Google Scholar Search 0*
  135. Justin Leonard, Shouhuai Xu, and Ravi Sandhu, A Framework for Understanding Botnets. In Proceedings of 3rd International Workshop on Advances in Information Security (WAIS at ARES), Fukuoka Institute of Technology, Fukuoka, Japan, March 16-19, 2009, pages 917-922. Presentation
    Google Scholar Search 0.1*
  136. Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, A Conceptual Framework for Group-Centric Secure Information Sharing. In Proceedings 4th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Sydney, Australia, March 10-12, 2009, pages 384-387. Full version. Presentation
    Google Scholar Search 0.1*
  137. 2008: 6

  138. Ram Krishnan, Jianwei Niu, Ravi Sandhu and William Winsborough, Stale-Safe Security Properties for Group-Based Secure Information Sharing. In Proceedings 6th ACM-CCS Workshop on Formal Methods in Security Engineering (FMSE), Alexandria, Virginia, October 27, 2008, pages 53-62. Full version. Presentation
    Google Scholar Search 0.1*
  139. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William Winsborough and Bhavani Thuraisingham, ROWLBAC: Representing Role Based Access Control in OWL. In Proceedings 13th ACM Symposium on Access Control Models and Technologies (SACMAT), Estes Park, Colorado, June 11-13, 2008, pages 73-82. Presentation
    Google Scholar Search 2*
  140. Xinwen Zhang, Jean-Pierre Seifert and Ravi Sandhu, Security Enforcement Model for Distributed Usage Control In Proceedings 2nd IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Taichung, Taiwan, June 11-13, 2008, pages 10-18. Presentation Keynote Lecture
    Google Scholar Search 0.1*
  141. Vana Kalogeraki, Dimitrios Gunopulos, Ravi Sandhu and Bhavani Thuraisingham, QoS Aware Dependable Distributed Stream Processing. In Proceedings 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (ISORC), Orlando, Florida, May 5-7, 2008, pages 69-75. Presentation
    Google Scholar Search 0*
  142. Ravi Sandhu and Venkata Bhamidipati, The ASCAA Principles for Next-Generation Role-Based Access Control . In Proceedings 3rd International Conference on Availability, Reliability and Security (ARES), Barcelona, Spain, March 4-7, 2008, pages xxvii-xxxii. Presentation Keynote Lecture
    Google Scholar Search 0.1*
  143. Xinwen Zhang, Dongyu Liu, Songqing Chen, Zhao Zhang and Ravi Sandhu, Towards Digital Rights Protection in BitTorrent-like P2P Systems. In Proceedings15th SPIE/ACM Multimedia Computing and Networking (MMCN), San Jose, CA USA, January 30-31, 2008, pages 68180F 1-12. Presentation
    Google Scholar Search 0.1*

    2007: 7

  144. Manoj Sastry, Ram Krishnan and Ravi Sandhu, A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems. In Proceedings Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS, Saint Petersburg, Russia, September 13-15, 2007. Published as Springer-Verlag Communications in Computer and Information Science, Volume 1, pages 153-158. Full version. Presentation
    Google Scholar Search
  145. Shouhuai Xu and Ravi Sandhu, A Scalable and Secure Cryptographic Service. In Proceedings 21st IFIP WG 11.3 Working Conf. on Data and Applications Security, Redondo Beach, CA, July 8-11, 2007, pages 144-160. Published as Springer-Verlag Lecture Notes in Computer Science Vol. 4602, Data and Applications Security XXI (S. Barker and G. Ahn, editors), 2007. Full version. Presentation
    Google Scholar Search
  146. Baoxian Zhao, Ravi Sandhu, Xinwen Zhang and Xiaolin Qin, Towards a Times-Based Usage Control Model. In Proceedings 21st IFIP WG 11.3 Working Conf. on Data and Applications Security, Redondo Beach, CA, July 8-11, 2007, pages 227-242. Published as Springer-Verlag Lecture Notes in Computer Science Vol. 4602, Data and Applications Security XXI (S. Barker and G. Ahn, editors), 2007. Presentation
    Google Scholar Search
  147. Ezedin Barka and Ravi Sandhu, Framework for Agent-Based Role Delegation. In Proceedings IEEE International Conference on Communications (ICC), Glasgow, Scotland, June 24-28, 2007, pages 1361-1367. Presentation
    Google Scholar Search
  148. Min Xu, Xuxian Jiang, Ravi Sandhu and Xinwen Zhang, Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection. In Proceedings 12th ACM Symposium on Access Control Models and Technologies (SACMAT), June 20-22, 2007, Sophia Antipolis, France, pages 71-80. Presentation
    Google Scholar Search **
  149. Ram Krishnan, Ravi Sandhu and Kumar Ranganathan, PEI Models towards Scalable, Usable and High-Assurance Information Sharing. In Proceedings 12th ACM Symposium on Access Control Models and Technologies (SACMAT), June 20-22, 2007, Sophia Antipolis, France, pages 145-150. Full version. Presentation
    Google Scholar Search ...
  150. Xinwen Zhang, Michael Covington, Songqing Chen and Ravi Sandhu, SecureBus: Towards Application-Transparent Trusted Computing with Mandatory Access Control, AsiaCCS 2007. Presentation
    Google Scholar Search
  151. 2006: 6

  152. Zhixiong Zhang, Xinwen Zhang and Ravi Sandhu, ROBAC: Scalable Role and Organization Based Access Control Models, Proceedings of the 1st IEEE International Workshop on Trusted Collaboration (TrustCol 2006), Atlanta, Georgia, November 17, 2006, 9 pages.
    Google Scholar Search
  153. Xinwen Zhang, Francesco Parisi-Presicce, and Ravi Sandhu, Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing, IWSEC 2006. Presentation
    Google Scholar Search
  154. Xinwen Zhang, Masayuki Nakae, Michael Covington and Ravi Sandhu, A Usage-based Authorization Framework for Collaborative Computing Systems, SACMAT 2006. Presentation
    Google Scholar Search *
  155. Ravi Sandhu, Kumar Ranganathan and Xinwen Zhang, Secure Information Sharing Enabled by Trusted Computing and PEI Models (Invited Talk), AsiaCCS 2006. Presentation
    Google Scholar Search 100+
  156. Xinwen Zhang, Ravi Sandhu, and Francesco Parisi-Presicce, Safety Analysis of Usage Control Authorization Models, AsiaCCS 2006. Presentation
    Google Scholar Search ...
  157. Masayuki Nakae, Xinwen Zhang and Ravi Sandhu, A General Design Towards Secure Ad-Hoc Collaboration, AsiaCCS, 2006.
    Google Scholar Search
  158. 2005: 1

  159. Ravi Sandhu and Xinwen Zhang, Peer-to-Peer Access Control Architecture Using Trusted Computing Technology, SACMAT 2005. Presentation
    Google Scholar Search **
  160. 2004: 8

  161. Ezedin Barka and Ravi Sandhu, Role-Based Delegation Model/ Hierarchical Roles (RBDM1), ACSAC 2004.
    Google Scholar Search *
  162. Mohammad Al-Kahtani and  Ravi Sandhu, Rule-Based RBAC with Negative Authorization, ACSAC 2004.
    Google Scholar Search *
  163. Ravi Sandhu, A Perspective on Graphs and Access Control Models (Invited Talk), ICGT 2004. Presentation
    Google Scholar Search
  164. Jaehong Park, Xinwen Zhang,  and Ravi Sandhu, Attribute Mutability in Usage Control, IFIP11.3 2004. Presentation
    Google Scholar Search *
  165. Roshan Thomas and Ravi Sandhu, Towards a Multi-dimensional Characterization of Dissemination Control, POLICY, 2004.
    Google Scholar Search
  166. Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi Sandhu, A Logical Specification for Usage Control, SACMAT 2004. Presentation
    Google Scholar Search **
  167. S. Xu, W. Nelson Jr. and R. Sandhu, Enhancing Anonymity via Market Competition, Information Assurance and Security -- IEEE ITCC 2004.
    Google Scholar Search
  168. Roshan Thomas and Ravi Sandhu, Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions, IEEE PerSec'04.
    Google Scholar Search ...
  169. 2003: 5

  170. Ravi Sandhu and Jaehong Park, Usage Control: A Vision for Next Generation Access Control, MMM-ACNS 2003. Presentation
    Google Scholar Search ***
  171. Xinwen Zhang, Jaehong Park and Ravi Sandhu, Schema based XML Security: RBAC Approach, IFIP11.3 2003.
    Google Scholar Search ...
  172. Xinwen Zhang, Sejong Oh and Ravi Sandhu, PBDM: A Flexible Delegation Model in RBAC, SACMAT 2003. Presentation
    Google Scholar Search ***
  173. Mohammad A. Al-Kahtani and Ravi Sandhu, Induced Role Hierarchies with Attribute-Based RBAC, SACMAT 2003. Presentation
    Google Scholar Search *
  174. Shouhuai Xu and Ravi Sandhu. Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures, RSA-CT 2003. Presentation
    Google Scholar Search
  175. 2002: 6

  176. Ravi Sandhu, Mihir Bellare, and Ravi Ganesan, Password Enabled PKI: Virtual Smartcards vs. Virtual Soft Tokens, PKIRW 2002. Presentation
    Google Scholar Search 0.5*
  177. Mohammad A. Al-Kahtani and Ravi Sandhu, A Model for Attribute-Based User-Role Assignment, ACSAC 2002. Presentation
    Google Scholar Search 2*
  178. Sejong Oh, Ravi S. Sandhu, A Model for Role Administration Using Organization Structure, SACMAT 2002. Presentation
    Google Scholar Search 2*
  179. Jaehong Park and Ravi Sandhu, Towards Usage Control Models: Beyond Traditional Access Control, SACMAT 2002. Presentation
    Google Scholar Search 4*
  180. Jaehong Park and Ravi Sandhu, Originator Control in Usage Control, POLICY 2002.
    Google Scholar Search 0.5*
  181. Shouhuai Xu and Ravi Sandhu, Authenticated Multicast Immune to Denial-of-Service Attack, SAC 2002.
    Google Scholar Search 0.1*
  182. 2001: 4

  183. Pete Epstein and Ravi Sandhu, Engineering of Role-Permission Assignments, ACSAC 2001.
    Google Scholar Search 0.5*
  184. Joon Park, Gail-Joon Ahn and Ravi Sandhu, Role-based Access Control on the Web Using LDAP, IFIP11.3 2001.
    Google Scholar Search 0*
  185. Savith Kandala and Ravi Sandhu, Secure Role-Based Workflow Models, IFIP11.3 2001.
    Google Scholar Search 0.5*
  186. Ravi Sandhu, Future Directions in Role-Based Access Control Models (Keynote Lecture), MMM-ACNS 2001. Presentation
    Google Scholar Search 0.5*
  187. 2000: 8

  188. Ezedin Barka and Ravi Sandhu, Framework for Role-Based Delegation Models, ACSAC 2000. Presentation
    Google Scholar Search
  189. Jaehong Park, Ravi Sandhu and James Schifalacqua, Security Architectures for Controlled Digital Information Dissemination, ACSAC 2000. Presentation
    Google Scholar Search
  190. Joon S. Park and Ravi Sandhu, Binding Identities and Attributes Using Digitally Signed Certificates, ACSAC 2000.
    Google Scholar Search
  191. Ezedin Barka and Ravi Sandhu, A Role-Based Delegation Model and Some Extensions, NISSC 2000. Presentation
    Google Scholar Search
  192. Venkata Bhamidipati and Ravi Sandhu, Push Architectures for User-Role Assignment, NISSC 2000.
    Google Scholar Search
  193. Ravi Sandhu, Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way, ACM RBAC 2000. Presentation
    Google Scholar Search
  194. Ravi Sandhu, David Ferraiolo and Richard Kuhn, The NIST Model for Role-Based Access Control: Towards A Unified Standard, ACM RBAC 2000.
    Google Scholar Search
  195. Gail-Joon Ahn, Myong Kang, Joon Park and Ravi Sandhu, Injecting RBAC to Secure a Web-Based Workflow System, ACM RBAC 2000. Presentation
    Google Scholar Search
  196. 1999: 8

  197. Gail-Joon Ahn and Ravi Sandhu, The RSL99 Language for Role-Based Separation of Duty Constraints, ACM RBAC 1999.
    Google Scholar Search
  198. Pete Epstein and Ravi Sandhu, Towards a UML Based Approach to Role Engineering, ACM RBAC 1999.
    Google Scholar Search
  199. Joon S. Park and Ravi Sandhu, RBAC on the Web by Smart Certificates, ACM RBAC 1999.
    Google Scholar Search
  200. Ravi Sandhu and Qamar Munawer, Simulation of the Augmented Typed Access Matrix Model (ATAM) Using Roles, INFOSECU 1999.
    Google Scholar Search
  201. Ravi Sandhu and Qamar Munawer, The ARBAC99 Model for Administration of Roles, ACSAC 1999. Presentation
    Google Scholar Search
  202. Joon S. Park and Ravi Sandhu, Smart Certificates: Extending X.509 for Secure Attribute Service on the Web, NISSC 1999. Presentation
    Google Scholar Search
  203. Joon Park, Ravi Sandhu, and SreeLatha Ghanta, RBAC on the Web by Secure Cookies, IFIP11.3 1999.
    Google Scholar Search
  204. Savith Kandala and Ravi Sandhu, Extending the BFA Workflow Authorization Model to Express Weighted Voting, IFIP11.3 1999.
    Google Scholar Search
  205. 1998: 10

  206. Philip Hyland and Ravi Sandhu, Concentric Supervision of Security Applications: A New Security Management Paradigm, ACSAC 1998.
    Google Scholar Search
  207. Ravi Sandhu and Gail-Joon Ahn, Group Hierarchies with Decentralized User Assignment in Windows NT, IASTED-CSE 1998.
    Google Scholar Search
  208. Ravi Sandhu and Qamar Munawer, The RRA97 Model for Role-Based Administration of Role Hierarchies, ACSAC 1998.
    Google Scholar Search
  209. Ravi Sandhu and Qamar Munawer, How to do Discretionary Access Control Using Roles, ACM RBAC 1998. Presentation
    Google Scholar Search
  210. Ravi Sandhu, Role Activation Hierarchies, ACM RBAC 1998. Presentation
    Google Scholar Search
  211. Ravi Sandhu and Venkata Bhamidipati, An Oracle Implementation of the PRA97 Model for Permission-Role Assignment, ACM RBAC 1998. Presentation
    Google Scholar Search
  212. Ravi Sandhu and Joon S. Park, Decentralized User-Role Assignment for Web-based Intranets, ACM RBAC 1998.
    Google Scholar Search
  213. Philip Hyland and Ravi Sandhu, Management of Network Security Applications, NISSC 1998.
    Google Scholar Search
  214. Ravi Sandhu and Gail-Joon Ahn, Decentralized Group Hierarchies in UNIX: An Experiment and Lessons Learned, NISSC 1998.
    Google Scholar Search
  215. Chandramouli Ramaswamy and Ravi Sandhu, Role-Based Access Control Features in Commercial Database Management Systems (Winner of Best Paper Award), NISSC 1998.
    Google Scholar Search
  216. 1997: 4

  217. Tarik Himdi and Ravi Sandhu, Lattice Based Models for Controlled Sharing of Confidential Information in The Saudi Hajj System, ACSAC 1997.
    Google Scholar Search
  218. Ravi Sandhu, Venkata Bhamidipati, Edward Coyne, Srinivas Ganta and Charles Youman, The ARBAC97 Model for Role-Based Administration of Roles: Preliminary Description and Outline, ACM RBAC 1997. Presentation
    Google Scholar Search
  219. Ravi Sandhu and Venkata Bhamidipati, The URA97 Model for Role-Based User-Role Assignment, IFIP11.3 1997. Presentation
    Google Scholar Search
  220. Roshan Thomas and Ravi Sandhu, Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management, IFIP11.3 1997.
    Google Scholar Search
  221. 1996: 2

  222. Ravi Sandhu, Role Hierarchies and Constraints for Lattice-Based Access Controls, ESORICS 1996. Presentation
    Google Scholar Search 250+
  223. Ravi Sandhu, Access Control: The Neglected Frontier (Keynote Lecture), ACISP 1996. Presentation
    Google Scholar Search 50+
  224. 1995: 6

  225. Ravi Sandhu, Issues in RBAC, ACM RBAC 1995.
    Google Scholar Search
  226. Ravi Sandhu, Roles Versus Groups, ACM RBAC 1995.
    Google Scholar Search
  227. Ravi Sandhu, Rationale for the RBAC96 Family of Access Control Models, ACM RBAC 1995.
    Google Scholar Search
  228. Fang Chen and Ravi Sandhu, Constraints for Role-Based Access Control, ACM RBAC 1995.
    Google Scholar Search
  229. Jeremy Epstein and Ravi Sandhu, NetWare 4 as an Example of Role-Based Access Control, ACM RBAC 1995.
    Google Scholar Search
  230. Fang Chen and Ravi Sandhu, The Semantics and Expressive Power of the MLR Data Model, OAKLAND 1995.
    Google Scholar Search
  231. 1994: 7

  232. Roshan Thomas and Ravi Sandhu, Conceptual Foundations for a Model of Task-based Authorizations, CSFW 1994.
    Google Scholar Search
  233. Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman, Role-Based Access Control: A Multi-Dimensional View, ACSAC 1994. Presentation
    Google Scholar Search
  234. Ravi Sandhu and Srinivas Ganta, On the Expressive Power of the Unary Transformation Model, ESORICS 1994. Presentation
    Google Scholar Search
  235. Roshan Thomas and Ravi Sandhu, Supporting Object-based High-assurance Write-up in Multilevel databases for the Replicted Architecture, ESORICS 1994.
    Google Scholar Search
  236. Ravi Sandhu and Hal Feinstein, A Three Tier Architecture for Role-Based Access Control, NCSC 1994. Presentation
    Google Scholar Search
  237. Paul Ammann and Ravi Sandhu, One-Representative Safety Analysis in the Non-Monotonic Transform Model, CSFW 1994.
    Google Scholar Search
  238. Ravi Sandhu and Srinivas Ganta, On the Minimality of Testing for Rights in Transformation Models, OAKLAND 1994.
    Google Scholar Search
  239. 1993: 9

  240. Roshan Thomas and Ravi Sandhu, Towards a Task-Based Paradigm for Flexible and Adaptable Access Control in Distributed Applications, NSP 1993.
    Google Scholar Search 50+
  241. Roshan Thomas and Ravi Sandhu, Concurrency, Synchronization, and Scheduling to Support High-assurance Write-up in Multilevel Object-based Computing, OOPSLA Workshop 1993.
    Google Scholar Search 1+
  242. Ravi Sandhu and Srinivas Ganta, Expressive Power of the Single-Object Typed Access Matrix Model, ACSAC 1993.
    Google Scholar Search 1+
  243. Ravi Sandhu and Sushil Jajodia, Referential Integrity in Multilevel Secure Databases, NCSC 1993.
    Google Scholar Search 10+
  244. Roshan Thomas and Ravi Sandhu, Discretionary Access Control in Object-Oriented Databases: Issues and Research Directions, NCSC 1993.
    Google Scholar Search 25+
  245. Roshan Thomas and Ravi Sandhu, Task Based Authorization: A Paradigm for Flexible and Adaptable Access Control in Distributed Applications, NCSC 1993.
    Google Scholar Search 1+
  246. Ravi Sandhu, On Five Definitions of Data Integrity, IFIP11.3 1993. Presentation
    Google Scholar Search 50+
  247. Roshan Thomas and Ravi Sandhu, Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Multilevel Transactions, IFIP11.3 1993.
    Google Scholar Search 1+
  248. Ravi Sandhu and Srinivas Ganta, On Testing for Absence of Rights in Access Control Models, CSFW 1993.
    Google Scholar Search 25+
  249. 1992: 8

  250. Paul Ammann and Ravi Sandhu, Implementing Transaction Control Expressions by Checking for Absence of Access Rights, ACSAC 1992.
    Google Scholar Search 25+
  251. Ravi Sandhu and Sushil Jajodia, Polyinstantiation for Cover Stories, ESORICS 1992.
    Google Scholar Search 50+
  252. Ravi Sandhu, A Lattice Interpretation of the Chinese Wall Policy, NCSC 1992.
    Google Scholar Search 50+
  253. Ravi Sandhu and Gurpreet Suri, Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment (Winner of Outstanding Paper Award), NCSC 1992.
    Google Scholar Search 25+
  254. Ravi Sandhu, The Typed Access Matrix Model, OAKLAND 1992.
    Google Scholar Search 350+
  255. Ravi Sandhu and Gurpreet Suri, Non-Monotonic Transformations of Access Rights, OAKLAND 1992.
    Google Scholar Search 25+
  256. Roshan Thomas and Ravi Sandhu, Implementing the Message Filter Object-oriented Security Model without Trusted Subjects, IFIP11.3 1992.
    Google Scholar Search 10+
  257. Paul Ammann, Richard Lipton and Ravi Sandhu, The Expressive Power of Multi-Parent Creation in Monotonic Access Control Models, CSFW 1992.
    Google Scholar Search 10+
  258. 1991: 10

  259. John McDermott, Sushil Jajodia and Ravi Sandhu, A Single-Level Scheduler for the Replicated Architecture for Multilevel Secure Databases, ACSAC 1991.
    Google Scholar Search 150+
  260. Paul Ammann, Ravi Sandhu and Gurpreet Suri, A Distributed Implementation of the Extended Schematic Protection Model, ACSAC 1991.
    Google Scholar Search 10+
  261. Ravi Sandhu, Roshan Thomas and Sushil Jajodia, Supporting Timing Channel Free Computations in Multilevel Secure Object-Oriented Databases, IFIP11.3 1991.
    Google Scholar Search 10+
  262. Ravi Sandhu and Sushil Jajodia, Honest Databases That Can Keep Secrets, NCSC 1991.
    Google Scholar Search 25+
  263. Ravi Sandhu and Gurpreet Suri, A Distributed Implementation of the Transform Model, NCSC 1991.
    Google Scholar Search 1+
  264. Ravi Sandhu, Roshan Thomas and Sushil Jajodia, A Secure Kernelized Architecture for Multilevel Object-Oriented Databases, CSFW 1991.
    Google Scholar Search 10+
  265. Edgar Sibley, James Michael and Ravi Sandhu, A Case Study of Security Policy for Manual and Automated Systems, COMPASS 1991.
    Google Scholar Search 1+
  266. Sushil Jajodia and Ravi Sandhu, Toward a Multilevel Secure Relational Data Model, SIGMOD 1991.
    Google Scholar Search 250+
  267. Paul Ammann and Ravi Sandhu, Safety Analysis for the Extended Schematic Protection Model, OAKLAND 1991.
    Google Scholar Search 50+
  268. Sushil Jajodia and Ravi Sandhu, A Novel Decomposition of Multilevel Relations into Single-Level Relations, OAKLAND 1991.
    Google Scholar Search 25+
  269. 1990: 8

  270. Paul Ammann and Ravi Sandhu, Extending the Creation Operation in the Schematic Protection Model, ACSAC 1990.
    Google Scholar Search 25+
  271. Sushil Jajodia, Ravi Sandhu and Edgar Sibley, Update Semantics for Multilevel Relations, ACSAC 1990.
    Google Scholar Search 25+
  272. Ravi Sandhu and Sushil Jajodia, Integrity Mechanisms in Database Management Systems, NCSC 1990.
    Google Scholar Search 25+
  273. Ravi Sandhu and Sushil Jajodia, Polyinstantiation Integrity in Multilevel Relations, OAKLAND 1990.
    Google Scholar Search 100+
  274. Ravi Sandhu, Separation of Duties in Computerized Information Systems, IFIP11.3 1990.
    Google Scholar Search 150+
  275. Sushil Jajodia and Ravi Sandhu, Polyinstantiation Integrity in Multilevel Relations Revisited,, IFIP11.3 1990.
    Google Scholar Search 1+
  276. Ravi Sandhu, Sushil Jajodia and Teresa Lunt, A New Polyinstantiation Integrity Constraint for Multilevel Relations, CSFW 1990.
    Google Scholar Search 25+
  277. Sushil Jajodia and Ravi Sandhu, A Formal Framework for Single Level Decomposition of Multilevel Relations, CSFW 1990.
    Google Scholar Search 10+
  278. 1989: 3

  279. Ravi Sandhu, Mandatory Controls for Database Integrity, IFIP11.3 1989.
    Google Scholar Search 25+
  280. Ravi Sandhu, Transformation of Access Rights, OAKLAND 1989.
    Google Scholar Search 25+
  281. Ravi Sandhu, Terminology, Criteria and System Architectures for Data Integrity, IWDI 1989.
    Google Scholar Search 10+
  282. 1988: 1

  283. Ravi Sandhu, Transaction Control Expressions for Separation of Duties, ACSAC 1988.
    Google Scholar Search 200+
  284. 1987: 1

  285. Ravi Sandhu, On Some Cryptographic Solutions for Access Control in a Tree Hierarchy, ACM-IEEE 1987.
    Google Scholar Search 50+
  286. 1986: 1

  287. Ravi Sandhu and Micheal Share, Some Owner-Based Schemes with Dynamic Groups in the Schematic Protection Model, OAKLAND 1986.
    Google Scholar Search 10+
  288. 1985: 1

  289. Ravi Sandhu, Analysis of Acyclic Attenuating Systems for the SSR Protection Model, OAKLAND 1985.
    Google Scholar Search 1+
  290. 1984: 1

  291. Ravi Sandhu, The SSR Model for Specification of Authorization Policies: A Case Study in Project Control, COMPSAC 1984.
    Google Scholar Search 1+